Cisco Secure Workload offers advanced auditing, micro-segmentation, and network visibility, automating policy presentation for improved security. It enhances application dependency mapping and provides comprehensive telemetry with strategic policy enforcement.


| Product | Mindshare (%) |
|---|---|
| Cisco Secure Workload | 9.5% |
| Illumio | 16.1% |
| Akamai Guardicore Segmentation | 15.2% |
| Other | 59.2% |
| Type | Title | Date | |
|---|---|---|---|
| Category | Cloud and Data Center Security | May 9, 2026 | Download |
| Product | Reviews, tips, and advice from real users | May 9, 2026 | Download |
| Comparison | Cisco Secure Workload vs Akamai Guardicore Segmentation | May 9, 2026 | Download |
| Comparison | Cisco Secure Workload vs VMware NSX | May 9, 2026 | Download |
| Comparison | Cisco Secure Workload vs Illumio | May 9, 2026 | Download |
| Title | Rating | Mindshare | Recommending | |
|---|---|---|---|---|
| Wiz | 4.4 | N/A | 97% | 42 interviewsAdd to research |
| SentinelOne Singularity Cloud Security | 4.4 | 3.4% | 99% | 124 interviewsAdd to research |
Cisco Secure Workload has undergone significant modifications, with certain functionalities being moved into Cisco SD-Access. Despite these changes, it still offers valuable features like vulnerability scanning and cataloging. It operates on an agent-based system and utilizes a catalog and scoring function to locate known vulnerabilities. Another valuable feature is that it provides end-to-end protection for Cisco products. Users appreciate its user-friendly interface and stability, and scalability.
A few users complained that Cisco Secure Workload is complex to use. They said the dashboard is not intuitive and that there is a significant learning curve. Some said the integration with products from different vendors could be better. Some users said they preferred the previous version of the product and wished all the functionality would be consolidated into a single product.
Users indicated they did not evaluate the return on investment (ROI) for Cisco Secure Workload.
Cisco Secure Workload is considered expensive, involving hardware and software costs.
The primary use case of Cisco Secure Workload is to support micro-segmentation within a Cisco shop, particularly in financial institutions. It complements the existing Cisco infrastructure, including routers, switches, and endpoints, as part of a suite of solutions.
Customers had good things to say about Cisco's customer service, finding the technical support to be satisfactory in terms of responsiveness. Cisco support is highly regarded in the field of networking products. However, some customers mentioned that the support may not be as strong for higher-layer products like software and application layer products.
The setup for Cisco Secure Workload involves deploying an agent, which is similar to other solutions. The initial setup process for Cisco Secure Workload was straightforward and could be completed within one to two days. It is recommended to have one to two people available for deployment and maintenance, although one person can handle the process with backup support.
The solution of Cisco Secure Workload is highly flexible and can easily accommodate growth.
The solution of Cisco Secure Workload is highly reliable and dependable, with no reported issues or interruptions.
| Company Size | Count |
|---|---|
| Small Business | 5 |
| Midsize Enterprise | 2 |
| Large Enterprise | 4 |
| Company Size | Count |
|---|---|
| Small Business | 141 |
| Midsize Enterprise | 128 |
| Large Enterprise | 447 |
Cisco Secure Workload specializes in automating micro-segmentation, data center management, and traffic analysis. Its capabilities facilitate application dependency mapping and enhance internal micro-segmentation, providing invaluable network visibility. Users find its automation in policy presentation and strategic enforcement beneficial, along with granular control and scalability, despite needing improvements in scalability and integration capabilities. Enhanced notification features, troubleshooting options, and an efficient interface are desired for seamless deployment, along with stronger multi-tenancy, redundancy, and monitoring functions. Broader platform support and integrated cloud connectivity are desired for unified management across tools.
What are the most important features?Entities in finance, gas, and oil sectors utilize Cisco Secure Workload for networking site management and compliance maintenance. It integrates into extensive Cisco infrastructure, aiding routers, switches, and endpoints, thus supporting auditors in network synchronization and auditing needs.
Cisco Secure Workload was previously known as Cisco Tetration.
ADP, University of North Carolina Charlotte (UNCC)
| Author info | Rating | Review Summary |
|---|---|---|
| Director, Head of Networks at MUFG, EMEA | 5.0 | We use Cisco Secure Workload primarily for micro-segmentation to protect internal servers and streamline policy discovery, valuing its automation and granular control. We initially considered Nutanix and ESX but chose Cisco for its agnostic, comprehensive solution. |
| Technical Solutions Architect - Cyber & Cloud Security Expert at Secure Cloud | 4.5 | Cisco Secure Workload is primarily effective for micro-segmentation by proposing policies and managing traffic flows, though it needs improvement in supporting diverse FTP servers and IBM AIX systems. The tool excels in policy creation and network restructuring. |
| Partner at a consultancy with 1-10 employees | 3.5 | I was once a fan of Cisco Secure Workload, but changes have made it less appealing. While it effectively identifies vulnerabilities and uses firewalls for micro-segmentation, its integration into Cisco SD-Access has increased costs and limited its standalone appeal. |
| Regional Presales Consultant (INS Division) at GBM | 3.5 | I use Secure Workload for micro-segmentation. Its end-to-end offering, stability, and scalability are good, but I find it complicated with an unintuitive dashboard. Setup was straightforward, and support is responsive. I recommend it. |
| Sales Manager at Compuequip DOS | 4.0 | I find this solution stable, user-friendly, and scalable, with good technical support. However, its integration with other solution types could be improved. Overall, I rate it eight out of ten. |
| Technical Presales at Vcom Technologies | 4.5 | I use Cisco Secure Workload for data communication and consultancy for ECS. The product's valuable feature is its multiple-device integration, but it needs cloud integration. I didn't consider other solutions and have no specific ROI or cloud provider details. |
| CTO at a tech vendor with 11-50 employees | 4.0 | I find its complete telemetry and stability excellent. However, the solution significantly lacks enterprise-grade multi-tenancy, monitoring, redundancy, and scalability, restricting its operational capabilities despite a straightforward initial setup. |
| Solutions Architect at Liberty Global | 4.5 | I found Cisco Tetration excellent for micro-segmentation and application visibility, with straightforward setup and no stability issues. While scalable, I wish it offered a single pane of glass to avoid overlap with other tools. |